• 제목/요약/키워드: Information Network

검색결과 31,064건 처리시간 0.038초

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

Wireless Network Health Information Retrieval Method Based on Data Mining Algorithm

  • Xiaoguang Guo
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.211-218
    • /
    • 2023
  • In order to improve the low accuracy of traditional wireless network health information retrieval methods, a wireless network health information retrieval method is designed based on data mining algorithm. The invalid health information stored in wireless network is filtered by data mapping, and the health information is clustered by data mining algorithm. On this basis, the high-frequency words of health information are classified to realize wireless network health information retrieval. The experimental results show that exactitude of design way is significantly higher than that of the traditional method, which can solve the problem of low accuracy of the traditional wireless network health information retrieval method.

SNS 이용동기 수준에 따른 정보교류, 네트워크 밀도, 정보신뢰성, 유대인식의 차이에 관한 연구 (A study on the Information interchange degree, Network density, Information reliability, Network sense of solidarity of According to the motive difference on Using social networks)

  • 박원준
    • 한국전자통신학회논문지
    • /
    • 제9권6호
    • /
    • pp.657-664
    • /
    • 2014
  • 본 연구는 SNS 이용자들을 대상으로 이용동기를 분석하여, 각 이용동기의 중간값을 기준으로 상, 중, 하로 구분하고, 정보교류, 네트워크 밀도, 정보신뢰도, 유대인식의 차이를 알아보았다. 소셜 네트워크 이용 동기는 정보추구 동기, 사회적 영향동기, 오락적 동기, 네트워크 형성동기로 나타났다. 이러한 이용동기 수준에 따라 종속변인으로 설정한 정보교류 정도, 네트워크 밀도, 정보신뢰도, 유대인식에 차이가 나타났다. 특히 정보교류 정도와 정보의 신뢰성은 4가지 동기 수준에 따라 차이가 나타났으며, 네트워크 밀도와 유대인식의 차이는 사회적 영향 동기 수준에 따라 차이가 나타났다.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

효율적 U-City 구축을 위한 정보통신망 선정방안에 관한 연구 - 자가망과 임대망 경제성 분석을 중심으로 - (A Study on Organization of Information Network for Efficient Construction of U-City - Focused on Economic Analysis of Municipal Network and Leased Network -)

  • 박상수;박승희;김성아;진상윤;주형우
    • 한국BIM학회 논문집
    • /
    • 제5권1호
    • /
    • pp.54-62
    • /
    • 2015
  • The Cities that recently developed have been applied to private network for establishing information communication network system. The local governments planning or pursuing U-City construction should also choose the private network in consideration of operation and maintenance. In viewpoint of agency operating u-City, it is necessary to integrate traditional and new network. However, there has been lack of guides to choose U-City network considering the economic analysis between private and leased network. This study analyzed the characteristics of private and leased network, and the cost-benefit by estimating the network cost and communication demand focused on U-services that are recently applied. This study purpose a guide for efficient U-City information network selected by estimating ROI(Return On Investment) and BEP(Break Even Point) for establishing private and leased network.

홈 디바이스 기밀정보 은폐시스템 설계 (Design of Hiding Secret Information System on Home Network Devices)

  • 김도우;한종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.841-844
    • /
    • 2007
  • 홈 네트워크에서 요구되는 보안 서비스는 홈의 정의에 따라 달라질 수 있다. 그리고 댁내에 어떠한 홈 네트워크 기술들이 포함될 것인가에 따라 달라진다. 홈 네트워크에서는 다양한 디바이스들이 네트워크에 연결되어 있다. 이러한 홈 디바이스들은 외부의 공격으로부터 안전하지 않은 환경에 존재하게 된다. 따라서 홈 디바이스 내에 저장되어 있는 비밀정보를 보호하기 위한 요소들이 필요하다. 본 논문에서는 안전한 홈 네트워크 서비스를 제공하기 위해 필요한 홈 디바이스 내의 비밀정보를 보호하기 위한 시스템을 설계하고자 한다.

  • PDF

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks

  • Pandey, Dinesh;Kim, Beom Hun;Gang, Hui-Seon;Kwon, Goo-Rak;Pyun, Jae-Young
    • Journal of Information Processing Systems
    • /
    • 제14권3호
    • /
    • pp.771-789
    • /
    • 2018
  • In heterogeneous wireless networks supporting multi-access services, selecting the best network from among the possible heterogeneous connections and providing seamless service during handover for a higher Quality of Services (QoSs) is a big challenge. Thus, we need an intelligent vertical handover (VHO) decision using suitable network parameters. In the conventional VHOs, various network parameters (i.e., signal strength, bandwidth, dropping probability, monetary cost of service, and power consumption) have been used to measure network status and select the preferred network. Because of various parameter features defined in each wireless/mobile network, the parameter conversion between different networks is required for a handover decision. Therefore, the handover process is highly complex and the selection of parameters is always an issue. In this paper, we present how to maximize network utilization as more than one target network exists during VHO. Also, we show how network parameters can be imbedded into IEEE 802.21-based signaling procedures to provide seamless connectivity during a handover. The network simulation showed that QoS-effective target network selection could be achieved by choosing the suitable parameters from Layers 1 and 2 in each candidate network.

홈 네트워크 서비스 구축을 위한 미들웨어 설계 및 구현 (A Design and Implementation of the Middleware for the Home Network Service)

  • 이승주
    • 정보학연구
    • /
    • 제10권4호
    • /
    • pp.57-67
    • /
    • 2007
  • In this paper, we propose a design and implementation of Home Network Middleware which offer integrated service of electronic products. Most senior nations setting to core paradigm to ubiquitous computing techniques and effort to get the novel information and making more power about information techniques. But, they don't have a skill to Home Network Middleware in electronic products. It is a more important in Home Network Middleware. So, we will try to study about Home Network Middleware skill. And suggest to proposition that is a novel Home Network Middleware.

  • PDF

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권8호
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.257-265
    • /
    • 2021
  • Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.